cmd/sandbox/main.go (59 lines of code) (raw):

// Licensed to Elasticsearch B.V. under one or more contributor // license agreements. See the NOTICE file distributed with // this work for additional information regarding copyright // ownership. Elasticsearch B.V. licenses this file to you under // the Apache License, Version 2.0 (the "License"); you may // not use this file except in compliance with the License. // You may obtain a copy of the License at // // http://www.apache.org/licenses/LICENSE-2.0 // // Unless required by applicable law or agreed to in writing, // software distributed under the License is distributed on an // "AS IS" BASIS, WITHOUT WARRANTIES OR CONDITIONS OF ANY // KIND, either express or implied. See the License for the // specific language governing permissions and limitations // under the License. package main import ( "flag" "fmt" "os" "os/exec" "github.com/elastic/go-ucfg/yaml" seccomp "github.com/elastic/go-seccomp-bpf" ) var ( policyFile string noNewPrivs bool ) func main() { flag.StringVar(&policyFile, "policy", "seccomp.yml", "seccomp policy file") flag.BoolVar(&noNewPrivs, "no-new-privs", true, "set no new privs bit") flag.Parse() args := flag.Args() if len(args) == 0 { fmt.Fprintf(os.Stderr, "You must specify a command and args to execute.\n") os.Exit(1) } // Load policy from file. policy, err := parsePolicy() if err != nil { fmt.Fprintf(os.Stderr, "error: %v\n", err) os.Exit(1) } // Create a filter based on config. filter := seccomp.Filter{ NoNewPrivs: noNewPrivs, Flag: seccomp.FilterFlagTSync, Policy: *policy, } // Load the BPF filter using the seccomp system call. if err = seccomp.LoadFilter(filter); err != nil { fmt.Fprintf(os.Stderr, "error loading filter: %v\n", err) os.Exit(1) } // Execute the specified command (requires execve). cmd := exec.Command(args[0], args[1:]...) cmd.Stdout = os.Stdout cmd.Stderr = os.Stderr cmd.Stdin = os.Stdin if err = cmd.Run(); err != nil { fmt.Fprintf(os.Stderr, "error: %v\n", err) os.Exit(1) } } func parsePolicy() (*seccomp.Policy, error) { conf, err := yaml.NewConfigWithFile(policyFile) if err != nil { return nil, err } type Config struct { Seccomp seccomp.Policy } var config Config if err = conf.Unpack(&config); err != nil { return nil, err } return &config.Seccomp, nil }